Operating System Security : Security Policies

Abstract

Security is the primary concern in the modern world. The main focus of this paper is the security of our information and its supporting infrastructure. By keeping the computer system secure we can provide the security to the computerized information and vital to that is the operating system. In order to have a secure operating system it must be supported by the suitable computer architecture. If the technology from which the OS is built and on which it is supported is not secure then there is no confidentiality in the security of the OS and of the information it maintains for the users. This is the short overview of OS Security. In this paper we will discuss about the security policies that can be supported by the system.

Authors and Affiliations

Sarika Choudhary

Keywords

Related Articles

Using Queuing theory the performance measures of cloud with infinite servers

Cloud computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service of cloud the user has to be in queue until he is served. Each arriving Cloud computing User (CCU) request...

IMAGE MINING TECHNIQUES: A LITERATURE SURVEY

Nowadays, a large portion of information is in visual form; it is essential and certainly pleasing to search for images. Image mining has a variety of applications in various sectors like medical diagnosis, biology, remo...

Mobicast Routing Protocol with Multiple Sink Zone Formation in Underwater Sensor Networks

In this paper, we groping the multiple Sink Zone formation Mobicast routing protocol for 3-D Underwater Sensor Networks (USNs). The 3-D USNs consists a number of sensor nodes which are deployed in 3-D environment and Sen...

Intrusion Detection System with Data Stream Modeling using Conditional Privileges

IDS for computer network is capable of detecting and alerting the systems administrator on potential intrusion, providing guidance against any potential loss of integrity and confidentiality to the enterprise’s valuable...

IMPACT AND UTILIZATION OF PROJECTORS IN HIGHER EDUCATION WITH LOW ENERGY CONSUMPTION AND LAST LONG BATTIES IN WSN ENVIRONMENT

It has been observed that in Higher Education there is no proper utilization of modern techniques and utilization of ICT. There are several types of modern technology used in class room to delivered lectures so, that stu...

Download PDF file
  • EP ID EP135909
  • DOI -
  • Views 81
  • Downloads 0

How To Cite

Sarika Choudhary (2013). Operating System Security : Security Policies. International Journal of Computer Science & Engineering Technology, 4(7), 942-947. https://europub.co.uk/articles/-A-135909